城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): Akamai Technologies, Inc.
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.106.187.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51849
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.106.187.147. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019053000 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu May 30 20:30:00 CST 2019
;; MSG SIZE rcvd: 119
147.187.106.104.in-addr.arpa domain name pointer a104-106-187-147.deploy.static.akamaitechnologies.com.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
147.187.106.104.in-addr.arpa name = a104-106-187-147.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
87.10.49.241 | attackspam | Brute force attempt |
2020-02-09 23:26:30 |
79.107.71.9 | attackspam | 37215/tcp [2020-02-09]1pkt |
2020-02-09 23:52:33 |
89.36.166.43 | attackbotsspam | Brute force attempt |
2020-02-09 23:31:30 |
45.183.193.1 | attackbots | Feb 9 11:38:02 firewall sshd[21902]: Invalid user xzr from 45.183.193.1 Feb 9 11:38:05 firewall sshd[21902]: Failed password for invalid user xzr from 45.183.193.1 port 52808 ssh2 Feb 9 11:41:49 firewall sshd[22074]: Invalid user obf from 45.183.193.1 ... |
2020-02-09 23:07:31 |
196.179.230.10 | attackspam | Unauthorised access (Feb 9) SRC=196.179.230.10 LEN=48 TTL=113 ID=29611 DF TCP DPT=445 WINDOW=8192 SYN |
2020-02-09 23:40:01 |
139.59.70.106 | attackspam | $f2bV_matches |
2020-02-09 23:13:13 |
178.221.149.202 | attack | Automatic report - Port Scan Attack |
2020-02-09 23:51:16 |
178.209.88.36 | attack | Brute force attempt |
2020-02-09 23:22:35 |
103.216.160.154 | attack | Automatic report - Port Scan Attack |
2020-02-09 23:09:08 |
106.12.241.109 | attackbotsspam | Feb 9 04:36:47 web9 sshd\[7485\]: Invalid user kwh from 106.12.241.109 Feb 9 04:36:47 web9 sshd\[7485\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.241.109 Feb 9 04:36:49 web9 sshd\[7485\]: Failed password for invalid user kwh from 106.12.241.109 port 50910 ssh2 Feb 9 04:39:44 web9 sshd\[7876\]: Invalid user tws from 106.12.241.109 Feb 9 04:39:44 web9 sshd\[7876\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.241.109 |
2020-02-09 23:05:52 |
223.16.53.171 | attackspam | 23/tcp [2020-02-09]1pkt |
2020-02-09 23:38:58 |
66.147.237.24 | attackbotsspam | 02/09/2020-10:46:49.887603 66.147.237.24 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-02-09 23:49:34 |
41.62.155.63 | attack | Brute force attempt |
2020-02-09 23:32:36 |
114.35.76.122 | attackbots | Automatic report - Port Scan Attack |
2020-02-09 23:44:51 |
93.35.175.71 | attack | Brute force attempt |
2020-02-09 23:34:12 |